Check out the new USENIX Web site.
USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership


Register Now!     TRAINING PROGRAM

Overview | By Day (Monday, Tuesday) | By Instructor | All in One File

Training Instructors
Richard Bejtlich (M1) is a security engineer at National Security Solutions, a ManTech group. He was previously a principal consultant at Richard Bejtlich Foundstone, performing incident response, emergency network security monitoring, and security research. Prior to joining Foundstone in 2002, Richard served as senior engineer for managed network security operations at Ball Aerospace & Technologies Corporation. From 1998 to 2001 Richard defended global American information assets as a captain in the Air Force Computer Emergency Response Team (AFCERT). He led the AFCERT's real time intrusion detection mission, supervising 60 civilian and military analysts.

Formally trained as a military intelligence officer, Richard holds degrees from Harvard University and the United States Air Force Academy. He wrote original material for Hacking Exposed, 4th Ed., and Incident Response, 2nd Ed., both published by Osborne McGraw-Hill. Richard is the co-author of Real Digital Forensics and the author of The Tao of Network Security Monitoring, separate books to be published in 2004. He acquired his CISSP certification in 2001. His home page is

Brad C. Johnson (M4) is vice president of SystemExperts Corporation. Brad Johnson He has participated in seminal industry initiatives such as the Open Software Foundation, X/Open, and the IETF, and has been published often including in the Digital Technical Journal, IEEE Computer Society Press, Information Security Magazine, Boston Business Journal, Mass High Tech Journal, ISSA Password Magazine, and Wall Street & Technology. Brad is a regular tutorial instructor and conference speaker on topics related to practical network security, penetration analysis, middleware, and distributed systems. Brad holds a B.A. in computer science from Rutgers University and an M.S. in applied management from Lesley University.

Gary McGraw (T1), Cigital, Inc.'s CTO, researches software security and sets technical vision in Gary McGraw the area of Software Quality Management. Dr. McGraw is co-author of four popular books: Java Security (Wiley, 1996), Securing Java (Wiley, 1999), Software Fault Injection (Wiley 1998), and Building Secure Software (Addison-Wesley, 2001). His fifth book, Exploiting Software (Addison-Wesley), was released in February 2004. A noted authority on software and application security, Dr. McGraw consults with major software producers and consumers. Dr. McGraw has written over sixty peer-reviewed technical publications and functions as principal investigator on grants from Air Force Research Labs, DARPA, National Science Foundation, and NIST's Advanced Technology Program. He serves on Advisory Boards of Authentica, Counterpane, Fortify Software, and Indigo Security as well as advising the CS Department at UC Davis. Dr. McGraw holds a dual Ph.D. in Cognitive Science and Computer Science from Indiana University and a B.A. in Philosophy from UVa. He regularly contributes to popular trade publications and is often quoted in national press articles.

Radia Perlman (M3) is a Distinguished Engineer at Sun Microsystems. Radia Perlman She is known for her contributions to bridging (spanning tree algorithm) and routing (link state routing), as well as security (sabotage-proof networks). She is the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols and co-author of Network Security: Private Communication in a Public World, two of the top ten networking reference books, according to Network Magazine. She is one of the twenty-five people whose work has most influenced the networking industry, according to Data Communications Magazine. She has about fifty issued patents, an S.B. and S.M. in mathematics and a Ph.D. in computer science from MIT, and an honorary doctorate from KTH, the Royal Institute of Technology in Sweden.

Marcus Ranum (M2, T2) is senior scientist at Trusecure Corp. and a world-renowned expertMarcus Ranum on security system design and implementation. He is recognized as the inventor of the proxy firewall and the implementer of the first commercial firewall product. Since the late 1980s, he has designed a number of groundbreaking security products, including the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall, and NFR's Network Flight Recorder intrusion detection system. He has been involved in every level of operations of a security product business, from developer, to founder and CEO of NFR. Marcus has served as a consultant to many FORTUNE 500 firms and national governments, as well as serving as a guest lecturer and instructor at numerous high-tech conferences. In 2001, he was awarded the TISC Clue award for service to the security community, and he holds the ISSA lifetime achievement award.

David Rhoades (T3) is a principal consultant with Maven Security Consulting, Inc.David Rhoades Since 1996, David has provided information protection services for various FORTUNE 500 customers. His work has taken him across the US and abroad to Europe and Asia, where he has lectured and consulted in various areas of information security. David has a B.S. in computer engineering from the Pennsylvania State University and is an instructor for the SANS Institute, the MIS Training Institute, and Sensecurity (based in Singapore).

Moti Yung (T4) received a Ph.D. in Computer Science from Columbia University.Moti Yung He is currently a Senior Visiting Researcher at Columbia University's Computer Science Department and an Industry Consultant. Previously, he was a cryptographer and V.P. with CertCo and with IBM Research Division, where he received IBM's outstanding innovation award for his research contributions leading to products. He is an editor of the Journal of Cryptology and of the International Journal on Information Security, and served as Program Chair for Crypto 2002. He has published works on numerous aspects of cryptography, security, and on foundations of computer science; recently he coauthored a book on Malicious Cryptography (Wiley 2004).

?Need help? Use our Contacts page.

Last changed: 8 June 2004 jel